Naziv
|
Reflected XSS
|
Sažetak
|
This type of attack is a form of Cross-Site Scripting (XSS) where a malicious script is "reflected" off a vulnerable web application and then executed by a victim's browser. The process starts with an adversary delivering a malicious script to a victim and convincing the victim to send the script to the vulnerable web application. The most common method of this is through a phishing email where the adversary embeds the malicious script with a URL that the victim then clicks on. In processing the subsequent request, the vulnerable web application incorrectly considers the malicious script as valid input and uses it to creates a reposnse that is then sent back to the victim. To launch a successful Reflected XSS attack, an adversary looks for places where user-input is used directly in the generation of a response. This often involves elements that are not expected to host scripts such as image tags (<img>), or the addition of event attibutes such as onload and onmouseover. These elements are often not subject to the same input validation, output encoding, and other content filtering and checking routines.
|
Preduvjeti
|
An application that leverages a client-side web browser with scripting enabled.|An application that fail to adequately sanitize or encode untrusted input.
|
Rješenja
|
['Use browser technologies that do not allow client-side scripting.', 'Utilize strict type, character, and encoding enforcement.', 'Ensure that all user-supplied input is validated before use.']
|